Topic: Firewall Implementation Using Cisco Packet Tracer: Department of Information Technology
Topic: Firewall Implementation Using Cisco Packet Tracer: Department of Information Technology
Topic: Firewall Implementation Using Cisco Packet Tracer: Department of Information Technology
DEPARTMENT OF INFORMATION
TECHNOLOGY
Microproject Report
Network and Information Security [NIS]
THAKUR POLYTECHNIC
(AN ISO 9001:2015 Certified Institute)
Thakur Complex, West to W.E Highway, Kandivali (E), Mumbai – 400 101.
(Accredited by: National Board of Accreditation)
1|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Certificate
This is to certify that: Anjali Chaurasiya (2105220096), Sanskruti Londhe
(2105220151)Ananya Parbat(2205220277) of Fifth Semester of Diploma in
Information Technology of Institute, Thakur Polytechnic (Code: 0522)
havecompleted the Micro Project satisfactorily in subject Management for
the academic year 2023-24 as prescribed in the curriculum.
2|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
ACKNOWLEDGEMENT
We consider ourselves lucky enough to get such a good project. This project
would add as an asset to my academic profile. We express our gratitude to the
help of the Head of the Department of Information technology, Mrs. Suwarna
Thakre, for her constant supervision, guidance and co-operation throughout
theproject and we would like to express our thankfulness to our project guide
(subject teacher), MR.Sumit Parmar. for his constant motivation and
valuable help through the project work. We extend our sincere gratitude to our
parents who have encouraged us with their blessings to do this project
successfully.
THANK YOU
3|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
PROPOSAL
4|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Micro-Project Proposal
Firewall Implementation using cisco packet tracer
2. Course Outcomes:
• Apply measures to prevent attack on network using firewall.
3. Proposed Methodology:
In order to complete the Micro-Project Network and Information
security the procedure that will be followed is listed below:
• Collection of Information
• Co-ordination with necessary ethics
• Group discussion
• References from websites and books
• Execution of the project
• Preparing the report
• Presentation of project
• Report Submission
5|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
4. Action Plan:
Sr. No Details of Planned Start Planned Name of
Activity Date Finished responsible
Date team members
1 Information 015-01-2024 20-01-2024 All team
Search members
2 Group 21-01-2024 28-01-2024 All team
Discussion members
3 Group 29-01-2024 05-02-2024 All team
Discussion members
4 Taking 04-02-2024 10-02-2024 Ananya parbat
Reference
5 Execution 12-02-2024 20-02-2024 Sanskruti Londhe
5. Resources Required:
1 Internet Available
2 software Available
6|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
REPORT
7|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
1. Rationale
Firewalls are essential components of network security that act as a barrier
between a trusted internal network and untrusted external networks, such as
the internet. The primary purpose of implementing a firewall is to enhance
the security posture of an organization by controlling and monitoring
incoming and outgoing network traffic based on predetermined security
rules.
8|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
5. Resources Required
Sr. Name of Specifications Remarks
No Resources/Materials
1 Internet https://www.mypractically.xyz Available
/2023/04/msbte-management-
notes-22509-all-branch.html
2 Software Available
6. Literature Review
• The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by Clifford Stoll: A non-fiction book that details the author's real-life
experience tracking down a hacker who breached the security of a computer
network in the 1980s.
• Cybersecurity and Cyberwar: What Everyone Needs to Know by P.W. Singer
and Allan Friedman: An accessible introduction to the world of cybersecurity,
covering topics such as cyber threats, hacking techniques, and the role of
government in protecting digital infrastructure.
• The Art of Intrusion: The Real Stories Behind the Exploits of Hackers,
Intruders and Deceivers by Kevin D. Mitnick and William L. Simon: A
collection of true stories that delve into the methods used by hackers to
infiltrate networks and compromise security Systems.
9|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
TYPES OF FIREWALL
1. Network-based firewall: This type of firewall is installed on a network gateway
and monitors incoming and outgoing traffic to block or allow specific types of
traffic based on predefined rules.
2. Host-based firewall: This type of firewall runs on individual devices, such as a
computer or server, and controls the traffic to and from that specific device.
3. Application-level firewall: This firewall monitors and controls network traffic at
the application level, allowing for more granular control over specific
applications or services.
4. Proxy firewall: A proxy firewall acts as an intermediary between the internal
network and external networks, filtering and blocking traffic based on specific
criteria.
5. Stateful firewall: This type of firewall keeps track of the state of active
connections and uses this information to make decisions about whether to allow
or block traffic.
6. Next-generation firewall: These firewalls combine traditional firewall
capabilities with advanced security features such as intrusion prevention,
application control, and deep packet inspection.
7. Packet-filtering firewall: A packet-filtering firewall examines packets of data as
they pass through the network and allows or blocks them based on predefined
rules.
8. Cloud firewall: This type of firewall is hosted in the cloud and provides
protection for cloud-based applications and data, often offering scalable and
flexible security measures
10 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Firewall implementation:
1.structure
11 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
12 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
13 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Applications:
Applications of Firewalls
14 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Conclusion:
In conclusion, firewalls are essential components of network security that help
to protect systems and data from a wide range of cyber threats. They serve as
a critical barrier between an organization's internal network and external
threats, controlling incoming and outgoing traffic based on predefined security
rules. By monitoring and filtering network traffic, firewalls can prevent
unauthorized access, mitigate the risk of malware infections, and enforce
security policies. It is important for organizations to implement firewalls as
part of a comprehensive cybersecurity strategy to safeguard their networks and
assets from potential security breaches.
15 | P a g e
Department of Information Technology, IF6I